Pavan Velpula

About Candidate

Having 2 + years of Experience in information security working with Security Operations Center (SOC).
Have experience and understanding on Security Technologies SIEM tool with Hands on experience with IBM Qradar and Splunk.
Finding false positive, fine tuning and escalating Security events.
Good understanding on security solutions like Anti-virus, DLP, proxy, Firewall, IPS, Email Security etc.
Having Experience on ticketing tool Service Now.
Monitoring and carrying out second level analysis incidents.
Have a firm understanding about networking concepts.
Monitoring the events on SIEM tool.
Have knowledge in device integration of windows and Linux devices.
Checking health status for all devices in ESM.
Preparing weekly, Monthly status reports.
Preparing alerts tracking reports, and fire eye reports.
Having work experience on phishing campaign.

Education

B
B.Tech
Lakireddy Balireddy College of Engineering Affiliated

Work & Experience

I
INFORMATION SECURITY ANALYST Oct 14, 2021 - TILL DATE
Parexel Pharma

Responsibilities: • Worked as a Security Analyst for 24*7 SOC operations. • Performing real-time monitoring, Investigation, Analysis, Reporting and escalation of security events from multiple log sources. • Verifying logs using SIEM tool (IBM QRadar and Splunk ) and creating & Fine-tuning rules and applying the filter conditions as per attacks on assets and servers. • Commissioning & Decommissioning the Servers and Network devices in QRadar and Splunk. • To track down the actual reason behind the offense generated and perform analysis to determine whether it is false or true positive. • Monitoring Palo alto Firewall for analysis Network traffic and blocking Backlisted Ip’s and URL’s in firewall parameter level. • Hands-on experience SIEM with analysis and/or response to information security threats or incidents. • Ability to provide relevant and timely analysis and recommendations to customers based on analysis of events from a SIEM platform. • Customer-facing, with good report-writing skills and strong communication skills at all levels. • Ability to provide technical and service leadership to L1analysts. • Incident response and Forensics experience is an asset and Strong Network Security experience. • Good experience in Performing SIEM platform performance health checks, tuning and optimization, Integrating log sources into SIEM technologies. • Experience in leading SIEM technologies and should have expertise on IBM QRadar, Splunk platform management. • Experience of network-based User Behavior Analytics (UBA). • Working knowledge on TCP/IP model and co-relating with real-life scenarios Good communication and collaboration skills. • Good understanding of ITIL processes, including Change Management, Incident Management and Problem Management.

Be the first to review “Pavan Velpula”